<</regurgitate on>

OK

http://www.interhack.net/pubs/fwfaq/
http://webopedia.internet.com/TERM/b/bastion_host.html

Marcus J. Ranum, "Thinking About Firewalls", SANS 1993. An updated version, 
"Thinking About Firewalls V2.0: Beyond Perimeter Security", is available at
http://pubweb.nfr.net/~mjr/pubs/think/index.htm.

Elizabeth D. Zwicky, Simon Cooper, and D. Brent Chapman "Building Internet 
Firewalls, 2nd Edition", O'Reilly & Associates, June 2000.


"Marcus Ranum is generally credited with applying the term bastion to hosts 
that are exposed to attack, and its common use in the firewall community. 
In the paper he states:

'Bastions are the highly fortified parts of a medieval castle; points that 
overlook critical areas of defense, usually having stronger walls, room for 
extra troops, and the occasional useful tub of boiling hot oil for 
discouraging attackers. A bastion host is a system identified by the 
firewall administrator as a critical strong point in the network's 
security. Generally, bastion hosts will have some degree of extra attention 
paid to their security, may undergo regular audits, and may have modified 
software.

Bastion hosts are not general purpose computing resources. They differ in 
both their purpose and their specific configuration. A victim host may 
permit network logins so users can run untrusted services, while
a firewall gateway may only permit logins at the system console. The 
process of configuring or constructing a bastion host is often referred to 
as hardening.

The effectiveness of a specific bastion host configuration can usually be 
judged by answering the following questions:

    1.How does the bastion host protect itself from attack?
    2.How does the bastion host protect the network behind it from attack?

Extreme caution should be exercised when installing new software on bastion 
hosts. Very few software products have been designed and tested to run on 
these exposed systems."



<<//regurgitate off>

At 02:56 PM 8/30/00 -0500, Noonan, Wesley wrote:
>Does anyone have any books, whitepapers, websites, etc. that define in some
>detail what a bastion host is? I think I understand what they are and
>why/where one should implement them, but want to make sure. As an example,
>would an external DNS server, either on a DMZ or exposed, used as a
>forwarder be considered a bastion host? TIA
>
>Wes Noonan, MCP+I/MCSE/MCT/CCNA/NNCSS
>Senior QA Rep
>(713) 918-2412
>BMC Software, Inc.
>[EMAIL PROTECTED]
>http://www.bmc.com
>
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to